Login / Signup
OECD cryptography policy guidelines.
Steve Orlowski
Published in:
Comput. Law Secur. Rev. (1997)
Keyphrases
</>
cellular automata
optimal policy
policy search
decision support system
policy makers
control policy
database
machine learning
knowledge base
policy making